TBS PHASE 1 EXAM LATEST REAL EXAM 200 QUESTIONS
AND CORRECT ANSWERS|AGRADE
define Operational Security (OPSEC), - ANSWER: The process to deny the enemy
critical information about us.
identify immediate actions for safeguarding suspected classified material - ANSWER:
Report all security violations or suspected compromises, including espionage
attempts, to the security manager immediately.
identify the levels of classified materials security classification - ANSWER: 1. Top
Secret -
2. Secret
3. Confidential - -
4. Unclassified -
top secret - ANSWER: - unauthorized disclosure can be expected to cause
exceptionally grave damage to national security. Orange cards
Secret - ANSWER: unauthorized disclosure could be expected to cause serious
damage to national security. Red card indicator
Confidential - ANSWER: - could be expected to cause identifiable damage to national
security- blue cards
Unclassified - ANSWER: any other material not marked
identify procedures for classified material spillage or compromise - ANSWER: Report
all security violations or suspected compromises, including espionage attempts, to
the security manager immediately.
Use classified material in a controlled environment that limits the number of people
who have access to it.
Cover or close material if uncleared personnel approach.
Never leave classified material unsecured.
Never take classified material home.
Memorize safe combinations; written records of combinations are only maintained
in the CMCC and may not be held by any individual.
Store nothing valuable with classified material.
Do not discuss classified material with anyone other than cleared personnel with
need to know.
Destroy material exactly when told using the prescribed method.
,identify the procedures for reporting persons suspected of espionage - ANSWER:
report the incident or person immediately to your chain of command, security
manager, S-2 Intelligence Officer, or Naval Criminal Investigative Services (NCIS
identify the methods used by foreign agents to collect information - ANSWER: 1.
Exploiting or stealing classified equipment and technology
2. Illegally transferring U.S. technology from third countries
3. Covert espionage.
4. Recruitment of Americans to a foreign cause or the exploitation of human
intelligence.
5. Cyber attacks
identify ways to safeguard personally identifiable information (PII) in - ANSWER: 1.
Ensuring that PI/PII contained in a system of records, , is protected so that the
security and confidentiality of the information is preserved.
2. Not disclosing any information contained in a system of records
3. Not maintaining unpublished official files.
4. Safeguarding the privacy of individuals and confidentiality of PI/PII contained in a
system of records.
5. Properly marking all FOR OFFICIAL USE ONLY - PRIVACY SENSITIVE - Any misuse or
unauthorized disclosure can result in both civil and criminal penalties."
6. Not maintaining privacy sensitive information in public folders.
7. Reporting any unauthorized disclosure of PI/PII f
.
8. DON activities shall not maintain records describing how an individual exercises
his/her rights guaranteed by the First Amendment
define personally identifiable information (PII - ANSWER: Any information or
characteristics that may be used to distinguish or trace an individual's identity, such
as their name, social security number, or biometric records. PII falls under the sub-
classification For Official Use Only (FOUO).
Communications
Security (COMSEC - ANSWER: Measures and controls taken to deny unauthorized
persons information derived from telecommunications systems and ensure
authenticity of such communications
,Classified Information - ANSWER: Official information which has been determined to
require, in the interests of national security, protection against unauthorized
disclosure and which has been so identified by the assignment of a security
classification
Classified Material - ANSWER: A document or any media upon which classified
information is recorded or embodied.
Security - ANSWER: The establishment of a protected environment for classified
information and materials
Access - ANSWER: The ability and opportunity to obtain knowledge of classified
information or possession of classified materials.
Need to Know - ANSWER: The necessity for access to knowledge or possession of
classified information in order to carry out official military or government duties.
Clearence - ANSWER: An administrative determination by a designated authority
that an individual is eligible for access to classified information of a specific
classification designation or less.
The 3 big - ANSWER: 1. Clearence , CCES and need to know
Original classification - not you - ANSWER: The Secretary of the Navy severely
restricts the power to classify new material or information which is not derived from
previously existing material or information
Derivative Classification Authority- ME - ANSWER: This power is inherent to all
personnel who work with classified materials and information. Specifically, if you
produce or extract classified material or information from other classified material,
you are responsible for classifying the newly created material to the appropriate
level. This authority must be exercised daily to ensure security.
Clearences - ANSWER: 1. Top Secret- 5 years max, based on one single scoop
background investigation
2. Secret- 10 years max, i
3. Confidental- 15 years
Billets and individual responsibility of CO - ANSWER: Is directly responsible and,
therefore, accountable for all matters pertaining to the security of classified
materials and information held or used by the command.
Responsibilities of Security manager - ANSWER: The CO assigns the unit security
manager, usually the battalion executive officer (XO). The security manager:
, Investigates all security violations and suspected compromises of classified
information and materia
Custodians - ANSWER: The two different custodians in the infantry battalion are the
classified material control custodian (CMCC) and the electronic keying material
systems manager. Custodians:
Store classified material in containers appropriate for the classification level of
material being stored.
Classified Material Control Custodian (CMCC) - ANSWER: Normally, the CMCC is the
S-1/Adjutant and handles classified materials such as operation orders, message
traffic, publications, manuals, etc. Generally the CMCC controls/handles classified
material that is not communication-oriented.
intel officer S-2 - ANSWER: The S-2 is usually assigned as the assistant security
manager and:
Initiates and monitors the progress of security investigations.
Informs the CO of all changes to individual security clearances. The S-2 is the staff
section where
individuals report to obtain or upgrade a security
clearance.
PII - ANSWER: Any information or characteristics that may be used to distinguish or
trace an individual's identity, such as their name, social security number, or
biometric records. PII falls under the sub-classification For Official Use Only (FOUO).
Espionage - ANSWER: is the act of obtaining, delivering, transmitting,
communicating, or receiving information about national defense with an intent, or
reason to believe, that the information may be used to the injury of the United
States or to the advantage of any foreign nation
How to treat
a frostbite - ANSWER: Move the casualty to a heated area such as a warming tent or
vehicle.
• Remove or loosen constrictive clothing to allow the blood to circulate freely to the
affected area.
• For deep frostbite, which has penetrated below the upper layers of skin and into
the muscles, transport the victim immediately to a medical facility. Do not attempt
to thaw the affected area.
Trench foot treatment - ANSWER: Keep the feet dry.
• Change socks often and air-dry or blot the moisture off.
• Keep the feet warm.
• Change socks often and use foot powder to absorb excess moisture.
• Only wear vapor barrier boots when necessary, and once afflicted, walk only as
much as necessary.
B151236 Prevention and
AND CORRECT ANSWERS|AGRADE
define Operational Security (OPSEC), - ANSWER: The process to deny the enemy
critical information about us.
identify immediate actions for safeguarding suspected classified material - ANSWER:
Report all security violations or suspected compromises, including espionage
attempts, to the security manager immediately.
identify the levels of classified materials security classification - ANSWER: 1. Top
Secret -
2. Secret
3. Confidential - -
4. Unclassified -
top secret - ANSWER: - unauthorized disclosure can be expected to cause
exceptionally grave damage to national security. Orange cards
Secret - ANSWER: unauthorized disclosure could be expected to cause serious
damage to national security. Red card indicator
Confidential - ANSWER: - could be expected to cause identifiable damage to national
security- blue cards
Unclassified - ANSWER: any other material not marked
identify procedures for classified material spillage or compromise - ANSWER: Report
all security violations or suspected compromises, including espionage attempts, to
the security manager immediately.
Use classified material in a controlled environment that limits the number of people
who have access to it.
Cover or close material if uncleared personnel approach.
Never leave classified material unsecured.
Never take classified material home.
Memorize safe combinations; written records of combinations are only maintained
in the CMCC and may not be held by any individual.
Store nothing valuable with classified material.
Do not discuss classified material with anyone other than cleared personnel with
need to know.
Destroy material exactly when told using the prescribed method.
,identify the procedures for reporting persons suspected of espionage - ANSWER:
report the incident or person immediately to your chain of command, security
manager, S-2 Intelligence Officer, or Naval Criminal Investigative Services (NCIS
identify the methods used by foreign agents to collect information - ANSWER: 1.
Exploiting or stealing classified equipment and technology
2. Illegally transferring U.S. technology from third countries
3. Covert espionage.
4. Recruitment of Americans to a foreign cause or the exploitation of human
intelligence.
5. Cyber attacks
identify ways to safeguard personally identifiable information (PII) in - ANSWER: 1.
Ensuring that PI/PII contained in a system of records, , is protected so that the
security and confidentiality of the information is preserved.
2. Not disclosing any information contained in a system of records
3. Not maintaining unpublished official files.
4. Safeguarding the privacy of individuals and confidentiality of PI/PII contained in a
system of records.
5. Properly marking all FOR OFFICIAL USE ONLY - PRIVACY SENSITIVE - Any misuse or
unauthorized disclosure can result in both civil and criminal penalties."
6. Not maintaining privacy sensitive information in public folders.
7. Reporting any unauthorized disclosure of PI/PII f
.
8. DON activities shall not maintain records describing how an individual exercises
his/her rights guaranteed by the First Amendment
define personally identifiable information (PII - ANSWER: Any information or
characteristics that may be used to distinguish or trace an individual's identity, such
as their name, social security number, or biometric records. PII falls under the sub-
classification For Official Use Only (FOUO).
Communications
Security (COMSEC - ANSWER: Measures and controls taken to deny unauthorized
persons information derived from telecommunications systems and ensure
authenticity of such communications
,Classified Information - ANSWER: Official information which has been determined to
require, in the interests of national security, protection against unauthorized
disclosure and which has been so identified by the assignment of a security
classification
Classified Material - ANSWER: A document or any media upon which classified
information is recorded or embodied.
Security - ANSWER: The establishment of a protected environment for classified
information and materials
Access - ANSWER: The ability and opportunity to obtain knowledge of classified
information or possession of classified materials.
Need to Know - ANSWER: The necessity for access to knowledge or possession of
classified information in order to carry out official military or government duties.
Clearence - ANSWER: An administrative determination by a designated authority
that an individual is eligible for access to classified information of a specific
classification designation or less.
The 3 big - ANSWER: 1. Clearence , CCES and need to know
Original classification - not you - ANSWER: The Secretary of the Navy severely
restricts the power to classify new material or information which is not derived from
previously existing material or information
Derivative Classification Authority- ME - ANSWER: This power is inherent to all
personnel who work with classified materials and information. Specifically, if you
produce or extract classified material or information from other classified material,
you are responsible for classifying the newly created material to the appropriate
level. This authority must be exercised daily to ensure security.
Clearences - ANSWER: 1. Top Secret- 5 years max, based on one single scoop
background investigation
2. Secret- 10 years max, i
3. Confidental- 15 years
Billets and individual responsibility of CO - ANSWER: Is directly responsible and,
therefore, accountable for all matters pertaining to the security of classified
materials and information held or used by the command.
Responsibilities of Security manager - ANSWER: The CO assigns the unit security
manager, usually the battalion executive officer (XO). The security manager:
, Investigates all security violations and suspected compromises of classified
information and materia
Custodians - ANSWER: The two different custodians in the infantry battalion are the
classified material control custodian (CMCC) and the electronic keying material
systems manager. Custodians:
Store classified material in containers appropriate for the classification level of
material being stored.
Classified Material Control Custodian (CMCC) - ANSWER: Normally, the CMCC is the
S-1/Adjutant and handles classified materials such as operation orders, message
traffic, publications, manuals, etc. Generally the CMCC controls/handles classified
material that is not communication-oriented.
intel officer S-2 - ANSWER: The S-2 is usually assigned as the assistant security
manager and:
Initiates and monitors the progress of security investigations.
Informs the CO of all changes to individual security clearances. The S-2 is the staff
section where
individuals report to obtain or upgrade a security
clearance.
PII - ANSWER: Any information or characteristics that may be used to distinguish or
trace an individual's identity, such as their name, social security number, or
biometric records. PII falls under the sub-classification For Official Use Only (FOUO).
Espionage - ANSWER: is the act of obtaining, delivering, transmitting,
communicating, or receiving information about national defense with an intent, or
reason to believe, that the information may be used to the injury of the United
States or to the advantage of any foreign nation
How to treat
a frostbite - ANSWER: Move the casualty to a heated area such as a warming tent or
vehicle.
• Remove or loosen constrictive clothing to allow the blood to circulate freely to the
affected area.
• For deep frostbite, which has penetrated below the upper layers of skin and into
the muscles, transport the victim immediately to a medical facility. Do not attempt
to thaw the affected area.
Trench foot treatment - ANSWER: Keep the feet dry.
• Change socks often and air-dry or blot the moisture off.
• Keep the feet warm.
• Change socks often and use foot powder to absorb excess moisture.
• Only wear vapor barrier boots when necessary, and once afflicted, walk only as
much as necessary.
B151236 Prevention and